Infosecurity Blogs

GDPR and Google Analytics – Privacy Concerns and Compliance Steps
Harman Singh explains how organizations can ensure they follow GDPR rules using Google Analytics

I'm @InfosecEditor...Get Me Out of Here!
Eleanor Dallaway reflects on her 15 years as Infosecurity Magazine Editor and announces that it’s time for someone else to take a spin in the editor’s chair.

New OWASP Top 10: Beware of Poor Security Practices
The OWASP Top 10 list, with good security practices and solutions, makes it easier to enforce better security posture

Why “Shields Up” Starts with Understanding and Protecting the Attack Surface
With the threat of en masse cyber-attacks from Russia, organizations should develop a 'Shields Up' security strategy

OWASP Risk Ranking Changes Reflect Transforming and Dynamic Nature of Security
The changes in the relative ranking of each application security risk and what they mean to you


The Most In-Demand Cyber Skill for 2022
A new category was rated as the most in-demand cybersecurity skill during this year's annual ISACA report

The Power of Foresight
Without a certified business continuity management system, businesses leave themselves open to risk

What is Adaptive Security?
We must embrace new methodologies built to specifically address today’s evolving threats

Capitalizing on a Crisis: What Global Events Mean for Cybersecurity
Cyber threats emanating from the Russia Ukraine are widespread and indiscriminate, and organizations must be prepared

OWASP Shines Light on Three New Risk Categories
Security teams must consider the new categories when looking to protect against today’s application security risks

Cloud Services Are Increasingly Exploited for Command and Control in Cyber Espionage Operations
Threat actors are making the most of cloud services for malicious purposes, so organizations should do the same for their security

OWASP Gives App Security a Fresh Look
Non-profit revamps methodology for top 10 list to reflect new risks and challenges posed by remote work

Credential Harvesting and Initial Access: What Are They and How Can I Hit Back?
Credential theft is a key element of initial access, and security teams must spot and respond to such activity rapidly

Time to Gear Up Your Company's Cybersecurity
It's becoming impossible to ignore the need for additional layers of security

Why We Expect More Multi-Level Extortion (And What to Do About It)
Why it matters to small to mid-sized enterprises and what IT and Security stakeholders can do about it

Ransomware Is On The Rise: Here’s How To Stay Protected
Ransomware is a mounting threat, but that doesn’t have to mean your organization is the next to be breached

Understanding DDoS Protection Options
It's vital to understand the topology, advantages and disadvantages of different DDoS protection options

Let’s Go Bold in Pursuit of Cyber Talent
From both recruitment and retention standpoints, there is much companies can do to calibrate their approaches for current realities

How Threat Hunting Evolved In 2021
Threat hunting has been pushing to new limits since 2021, but what are the major developments that have allowed it to thrive?



















